/linux-master/include/linux/ |
H A D | if_link.h | 30 __u32 trusted; member in struct:ifla_vf_info
|
/linux-master/crypto/ |
H A D | af_alg.c | 26 #include <keys/trusted-type.h> 317 !strcmp(key->type->name, "trusted")) {
|
/linux-master/crypto/asymmetric_keys/ |
H A D | restrict.c | 62 * new certificate as being trusted. 65 * matching parent certificate in the trusted list, -EKEYREJECTED if the 209 struct key *trusted, bool check_dest) 222 if (!trusted && !check_dest) 234 if (trusted) { 235 if (trusted->type == &key_type_keyring) { 237 key = find_asymmetric_key(trusted, sig->auth_ids[0], 242 } else if (trusted->type == &key_type_asymmetric) { 246 asymmetric_key_ids(trusted)->id; 270 key = __key_get(trusted); 206 key_or_keyring_common(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted, bool check_dest) argument 328 restrict_link_by_key_or_keyring(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument 356 restrict_link_by_key_or_keyring_chain(struct key *dest_keyring, const struct key_type *type, const union key_payload *payload, struct key *trusted) argument [all...] |
/linux-master/drivers/block/ |
H A D | xen-blkfront.c | 156 module_param_named(trusted, xen_blkif_trusted, bool, 0644); 157 MODULE_PARM_DESC(trusted, "Is the backend trusted"); 1781 /* Check if backend is trusted. */ 1783 !xenbus_read_unsigned(dev->nodename, "trusted", 1);
|
/linux-master/drivers/md/ |
H A D | dm-crypt.c | 42 #include <keys/trusted-type.h> 2577 !strncmp(key_string, "trusted:", key_desc - key_string + 1)) {
|
H A D | dm-verity-loadpin.c | 21 bool trusted = false; local 39 trusted = true; 46 return trusted; 51 * a verity device that is trusted by LoadPin. 59 bool trusted = false; local 79 trusted = true; 85 return trusted;
|
/linux-master/drivers/net/ethernet/broadcom/bnxt/ |
H A D | bnxt_sriov.c | 161 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trusted) argument 170 if (trusted) 205 ivi->trusted = bnxt_is_trusted_vf(bp, vf);
|
/linux-master/drivers/net/ethernet/cavium/liquidio/ |
H A D | lio_main.c | 2995 ivi->trusted = true; 2997 ivi->trusted = false; 3006 static int liquidio_send_vf_trust_cmd(struct lio *lio, int vfidx, bool trusted) argument 3021 trusted); 3049 /* trusted vf is not supported by firmware older than 1.7.1 */ 3066 netif_info(lio, drv, lio->netdev, "More than one trusted VF is not allowed\n"); 3087 netif_info(lio, drv, lio->netdev, "Failed to set VF trusted\n");
|
/linux-master/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth.h | 39 u8 trusted:1; member in struct:fun_vport_info
|
/linux-master/drivers/net/ethernet/hisilicon/hns3/hns3pf/ |
H A D | hclge_main.c | 3527 ivf->trusted = vport->vf_info.trusted; 9527 if (vport->vf_info.trusted && vport->vf_info.request_uc_en) 12020 if (vport->vf_info.trusted == new_trusted) 12023 vport->vf_info.trusted = new_trusted; 12524 if (vport->vf_info.trusted) {
|
H A D | hclge_main.h | 1045 u32 trusted; member in struct:hclge_vf_info
|
/linux-master/drivers/net/ethernet/huawei/hinic/ |
H A D | hinic_sriov.c | 585 ivi->trusted = vfinfo->trust; 847 dev_info(&sriov_info->pdev->dev, "Set VF %d trusted %s succeed\n", 850 dev_err(&sriov_info->pdev->dev, "Failed set VF %d trusted %s\n",
|
/linux-master/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_main.c | 1467 * @trusted: flag if the VF is trusted 1479 bool trusted) 1491 is_any = (trusted || 1512 * @trusted: flag if the VF is trusted 1529 bool trusted) 1538 vlan_filters, trusted); 1543 trusted); 2631 vlan_filters, pf->vf[vsi->vf_id].trusted); 1475 i40e_get_vf_new_vlan(struct i40e_vsi *vsi, struct i40e_new_mac_filter *new_mac, struct i40e_mac_filter *f, int vlan_filters, bool trusted) argument 1525 i40e_correct_vf_mac_vlan_filters(struct i40e_vsi *vsi, struct hlist_head *tmp_add_list, struct hlist_head *tmp_del_list, int vlan_filters, bool trusted) argument [all...] |
H A D | i40e_virtchnl_pf.c | 1146 if (vf->trusted) 2855 * add/delete unicast MAC addresses, unless the VF is trusted 2857 if (vf->pf_set_mac && !vf->trusted) 2866 /* If the VF is not trusted restrict the number of MAC/VLAN it can program 2944 "Cannot add more MAC addresses, VF is not trusted, switch the VF to trusted to add more functionality\n"); 2947 /* If this VF is trusted, it can use more resources than untrusted. 2948 * However to ensure that every trusted VF has appropriate number of 2957 "Cannot add more MAC addresses, trusted VF exhausted it's resources\n"); 3138 * administratively by PF or if VF is trusted [all...] |
H A D | i40e_virtchnl_pf.h | 84 bool trusted; member in struct:i40e_vf
|
/linux-master/drivers/net/ethernet/intel/ice/ |
H A D | ice_sriov.c | 1402 ivi->trusted = vf->trusted; 1483 * @trusted: Boolean value to enable/disable trusted VF 1485 * Enable or disable a given VF as trusted 1487 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted) argument 1506 /* Check if already trusted */ 1507 if (trusted == vf->trusted) { 1514 vf->trusted [all...] |
H A D | ice_sriov.h | 46 int ice_set_vf_trust(struct net_device *netdev, int vf_id, bool trusted); 100 int __always_unused vf_id, bool __always_unused trusted) 99 ice_set_vf_trust(struct net_device __always_unused *netdev, int __always_unused vf_id, bool __always_unused trusted) argument
|
H A D | ice_vf_lib.c | 399 assign_bit(ICE_VIRTCHNL_VF_CAP_PRIVILEGE, &vf->vf_caps, vf->trusted);
|
H A D | ice_vf_lib.h | 108 u8 trusted:1; member in struct:ice_vf
|
H A D | ice_virtchnl.c | 1829 * add/delete unicast MAC addresses, unless the VF is trusted 2087 dev_err(ice_pf_to_dev(pf), "Can't add more MAC addresses, because VF-%d is not trusted, switch the VF to trusted mode in order to add more functionalities\n", 2277 * If the VF is trusted then the VF is allowed to add as many VLANs as it 2345 dev_info(dev, "VF-%d is not trusted, switch the VF to trusted mode, in order to add more VLAN addresses\n", 2347 /* There is no need to let VF know about being not trusted, 2375 dev_info(dev, "VF-%d is not trusted, switch the VF to trusted mode, in order to add more VLAN addresses\n", 2378 * not trusted, s [all...] |
/linux-master/drivers/net/ethernet/intel/igb/ |
H A D | igb.h | 100 bool trusted; member in struct:vf_data_storage
|
H A D | igb_main.c | 4608 * if an un-trusted VF does not provide descriptors to hardware. 7199 /* By default VFs are not trusted */ 7200 adapter->vf_data[vf].trusted = false; 7828 !vf_data->trusted) { 7899 !vf_data->trusted) { 9879 if (adapter->vf_data[vf].trusted == setting) 9882 adapter->vf_data[vf].trusted = setting; 9902 ivi->trusted = adapter->vf_data[vf].trusted;
|
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe.h | 225 u8 trusted; member in struct:vf_data_storage
|
H A D | ixgbe_ipsec.c | 902 if (!adapter->vfinfo[vf].trusted || 1007 if (!adapter->vfinfo[vf].trusted) {
|
H A D | ixgbe_sriov.c | 110 adapter->vfinfo[i].trusted = false; 956 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && 997 if (adapter->vfinfo[vf].pf_set_mac && !adapter->vfinfo[vf].trusted && 1178 !adapter->vfinfo[vf].trusted) { 1821 if (adapter->vfinfo[vf].trusted == setting) 1824 adapter->vfinfo[vf].trusted = setting; 1849 ivi->trusted = adapter->vfinfo[vf].trusted;
|